A vulnerability was suspected in Linux Kernel up to 6.11.2. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was suspected in Linux Kernel up to 6.6.63/6.11.10/6.12.1. Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all.
A vulnerability was found in FancyPost Plugin up to 6.0.0 on WordPress and classified as critical. Affected by this issue is some unknown functionality of the component Shortcode Handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-10536. The attack may be launched remotely. There is no exploit available.
A vulnerability was suspected in Linux Kernel up to 6.1.122/6.6.68/6.12.7. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.
A vulnerability was found in School Management System Plugin up to 1.0.8 on WordPress. It has been classified as critical. This affects an unknown part. The manipulation leads to incorrect privilege assignment.
This vulnerability is uniquely identified as CVE-2024-12470. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in payuplugin PayU CommercePro Plugin up to 3.8.3 on WordPress. This vulnerability affects unknown code of the file /wp-json/payu/v1/generate-user-token of the component REST API Endpoint. The manipulation leads to improper authentication.
This vulnerability was named CVE-2024-12264. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.11.2. It has been rated as critical. This issue affects the function hda_sdw_machine_select. The manipulation leads to infinite loop.
The identification of this vulnerability is CVE-2024-50011. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.